{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T10:58:32.392","vulnerabilities":[{"cve":{"id":"CVE-2018-13802","sourceIdentifier":"productcert@siemens.com","published":"2018-10-10T17:29:04.000","lastModified":"2024-11-21T03:48:04.793","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability has been identified in ROX II (All versions < V2.12.1). An authenticated attacker with a high-privileged user account access via SSH could circumvent restrictions in place and execute arbitrary operating system commands. Successful exploitation requires that the attacker has network access to the SSH interface in on port 22/tcp. The attacker must be authenticated to exploit the vulnerability. The vulnerability could allow an attacker to execute arbitrary code on the device."},{"lang":"es","value":"Se ha identificado una vulnerabilidad en ROX II (todas las versiones anteriores a V2.12.1). Un atacante autenticado con acceso a una cuenta de usuario con altos privilegios podría eludir las restricciones existentes y ejecutar comandos arbitrarios del sistema operativo. Su explotación con éxito requiere que el atacante tenga acceso de red a la interfaz SSH en el puerto 22/tcp. El atacante debe estar autenticado para explotar la vulnerabilidad. La vulnerabilidad podría permitir que el atacante ejecute código arbitrario en el dispositivo."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"productcert@siemens.com","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:rox_ii_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"2.12.1","matchCriteriaId":"60522046-6A22-4087-96D2-A9F825D85CE0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:rox_ii:-:*:*:*:*:*:*:*","matchCriteriaId":"DA1FB2BC-5AE4-489F-A292-F7820CCB6838"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105545","source":"productcert@siemens.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-493830.pdf","source":"productcert@siemens.com","tags":["Vendor Advisory"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-282-03","source":"productcert@siemens.com","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/105545","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-493830.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-282-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]}]}}]}